Search results for "Security"

showing 10 items of 1693 documents

Before newspapers and the telegraph: information distribution in Livland more than two hundred years ago

2020

This paper concerns information dissemination in the Livland province of the Russian Empire at the turn of the eighteenth and the nineteenth centuries, when its rulers sent their orders to the provincial capital, Riga, by horse post. In Riga they were translated into German, and the ancient network of information dissemination used by the Lutheran Church was engaged. The orders of both the Empire and provincial rulers were delivered to Lutheran pastors, who announced this information to their parishes from the pulpit, speaking in Latvian or Estonian so as to be understood by local peasants (serfs), and allowed the texts to circulate around the manors of the parish. The infrastructure of th…

HistoryHistory and Philosophy of Sciencebusiness.industrymedia_common.quotation_subjectInformation DisseminationEmpireDistribution (economics)Information securityAncient historybusinessNewspapermedia_commonLibrary & Information History
researchProduct

“Another Munich We Just Cannot Afford”: Historical Metonymy In Politics

2016

The appeasement of Hitler and the Munich Agreement is a rhetorical comparison used commonly in international relations to defend politico-military action. On the basis of conceptual history and rhetorics, we examine cases of political speech in this paradigm. Firstly, we discuss time and conceptualize experience into first and second order experiences. Secondly, the roles of metaphor, metonymy and analogy in relation to thought and action are examined. We then contextualise Munich 1938, and present three cases demonstrating the political usage of this metonymy since WWII. These range from the Suez Crises to the Gulf War and on-going War on Terror. These cases show that “Munich” can be used …

HistoryMetaphorrhetoricGeneral Chemical Engineeringmedia_common.quotation_subjectappeasement0211 other engineering and technologiesAnalogy02 engineering and technologymetaphorAppeasement050602 political science & public administrationRhetorical questionConceptual historyMunich Agreementta517media_commonInternational relationsLiterature021110 strategic defence & security studiesMetonymybusiness.industry05 social sciences16. Peace & justicelcsh:JC11-607lcsh:Women. Feminismanalogylcsh:Political theoryappeasement; analogy; metaphor; metonymy; conceptual history; rhetoric0506 political scienceEpistemologyconceptual historymetonymybusinesslcsh:HQ1101-2030.7Redescriptions: Political Thought, Conceptual History and Feminist Theory
researchProduct

Terminological Games: The Finnish Security Police Monitoring the Far-Right Movements in Finland During the Cold War

2020

This article focuses on the use of terms and concepts related to the nationalist movements by the Finnish security police during the Cold War. The key objective of the security police was to protect the legal order of the state and monitor the groups and phenomena potentially harmful to that cause. The previous experience regarding the rise of the radical nationalism and fascism in Finland in the 1930s and the 1947 Paris peace treaties were the historical and legal contexts within which the interpretations were made. As the article shows, interpretation made by the security police, however, relied occasionally on a limited understanding about the evolving far-right scene, thus producing ter…

HistoryScrutinySociology and Political Sciencefascism; far-right; extremism; radical right; Finnish security police; conceptual historymedia_common.quotation_subjectääriliikkeetCriminologyGender StudiesState (polity)käsitehistoriaOrder (exchange)Political scienceäärioikeistolaisuusConceptual historySecurity policeterminologiakansallinen turvallisuusmedia_commonuusnatsismipolitical science conceptual history fascism studiesInterpretation (philosophy)finnish security policelcsh:JC11-607lcsh:Women. Feminismfar-rightfasismilcsh:Political theoryNationalismconceptual historyradical rightFinnish security policeCold warturvallisuuspoliisifascismlcsh:HQ1101-2030.7käsiteanalyysiextremismoikeistoliikkeetRedescriptions: Political Thought, Conceptual History and Feminist Theory
researchProduct

H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks

2009

In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collector’s retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption based scheme is not compromise resilient. To achieve all the desires, we propose a scheme - H2S by making use of both homomorphic secret sharing and homomorphic encryption. The security and efficiency of our scheme are justified by extensive analysis.

Homomorphic secret sharingComputer sciencebusiness.industryClient-side encryptionEncryptioncomputer.software_genreMultiple encryptionProbabilistic encryptionComputer Science::MultimediaComputer Science::Networking and Internet Architecture40-bit encryptionAttribute-based encryptionOn-the-fly encryptionbusinesscomputerComputer Science::Cryptography and SecurityComputer network2009 Fifth International Conference on Information Assurance and Security
researchProduct

Home as a Base for a Well-Lived Life: Comparing the Capabilities of Homeless Service Users in Housing First and the Staircase of Transition in Europe

2020

Nussbaum’s Central Capabilities refer to the elements of a well-lived life, and many adults who experience homelessness are deprived of these capabilities. The study aim was to investigate whether service users experience different homeless services as affording or constraining capabilities. We conducted semi-structured interviews with homeless service users (n = 77) in Housing First (HF) and staircase services (SS) in eight European countries. We used thematic analysis to identify three themes: autonomy and dependency, the relational impact of living arrangements, and community interaction and stigma. While SS participants were able to address their bodily integrity and health, their highe…

Housing FirstSociology and Political ScienceInternet privacy0211 other engineering and technologies0507 social and economic geography02 engineering and technologyDevelopmentHealthcare improvement science Radboud Institute for Health Sciences [Radboudumc 18]Capabilities approachOntological securityService userSociologySocial workbusiness.industryTransition (fiction)05 social sciences1. No povertyHomelessness021107 urban & regional planningBase (topology)EuropeUrban StudiesOntological securityHousing Firstbusiness050703 geography
researchProduct

The European Courts and the Security Council: Between Dédoublement Fonctionnel and Balancing of Values: a Rejoinder to Grainne de Burca, André Nollka…

2009

* Professor of International Law, University of Naples ‘ Federico II ’ . Email: padesena@tin.it ; Associate Professor of International Law, University of Palermo. Email: chiara.vitucci@unipa.it 1 Nollkaemper, ‘ The European Courts and the Security Council: Between Dedoublement Fonctionnel and Balancing of Values: A Reply to De Sena and Vitucci ’ , 20 EJIL (2009) 862. Andre Nollkaemper, Grainne de Burca and Iris Canor have made a number of critical observations which are – in part at least – interesting and useful. A full examination of them would probably demand more time and more space than we have been given here. Nevertheless, we will try to reply to some of their remarks and to clear up…

Human RightsSettore IUS/14 - Diritto Dell'Unione EuropeaSpace (commercial competition)International lawConstructiveDédoublement fonctionnelBalancing of ValuesLawPolitical Science and International RelationsSociologySecurity councilSettore IUS/13 - Diritto InternazionaleSecurity CouncilLawAssociate professorEuropean Court of Justice Security Council balancing of Values
researchProduct

A case study to the Evaluation of Global Environmental Quality, concerning thermal, acoustic and atmospheric conditions of urban areas

2013

In this paper we propose an operative procedure aimed at assessing and check the global environmental quality in the urban areas. This methodology is set up by using an ergonomic approach that analyses the interaction man-environment in terms of cause-effect and uses information and data from various sources contributing to the formation of discomfort degrees.[1-2] The representation technique by normo-grams is used for showing some applications executed along the urban territory of Palermo and allows to evaluate very simply all the parameters involved in human comfort. This paper is divided in 5 sections, after the introduction in section 2 a review of the principal simple and complex inde…

Human comfortSettore ING-IND/11 - Fisica Tecnica Ambientalenoise qualityComputer sciencePrincipal (computer security)air pollutionGeneral EngineeringEnvironmental engineeringemissionsCivil engineeringSet (abstract data type)Section (archaeology)Representation (mathematics)Air quality indexEnvironmental quality
researchProduct

Mobilità, sicurezza e nuove frontiere tecnologiche

2018

Mobilità, sicurezza e nuove frontiere tecnologiche sono settori che hanno ormai assunto un ruolo trainante nell’evoluzione/trasformazione del diritto penale e processuale penale dei paesi occidentali, e segnatamente di quelli europei. Su di essi si è incentrato un Modulo Jean Monnet svolto, tra il 2015 e il 2018, presso il Dipartimento di Giurisprudenza dell’Università di Palermo, che ha visto alternarsi, in qualità di relatori, tanto esperti di caratura internazionale quanto giovani studiosi e dottorandi. Questo libro contiene alcuni dei loro contributi: una raccolta che, se certo non esaurisce la trattazione della varietà e complessità di profili che ciascuno dei tre ambiti problematici p…

Human mobility - Security - Terrorism - Surveillance - New MediaSettore IUS/16 - Diritto Processuale PenaleSettore IUS/08 - Diritto CostituzionaleSettore IUS/17 - Diritto Penale
researchProduct

Security in the Wireless Application Protocol : post-graduate thesis in information and communication technology

2000

Masteroppgave i informasjons- og kommunikasjonsteknologi 2000 - Høgskolen i Agder, Grimstad The necessity of being online wherever you are and at any time, have brought foreword the WAP technology. Solution based on banking, industry, and sale among others, is services and application that are on the market to day. Like in all new technologies the security issues in WAP is of great interest. The interest lies on both possible intruders and company that want to make a profit out of it by offering services. This assignment enlightens possible security problems in the WAP architecture, both in the security layer Wireless Transport Layer of Security (WTLS) and the WAP infrastructure. The report…

IKT590SecuritywmlxmlVDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424
researchProduct

IS Security Policy Violations

2012

Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has examined this problem. To address this research gap, the authors test a model based on Rational Choice Theory RCT-a prominent criminological theory not yet applied in IS-which explains, in terms of a utilitarian calculation, an individual's decision to commit a violation. Empirical results show that the effects of informal sanctions, moral beliefs, and perceived benefits convincingly explain employee IS security policy violations, while the effect of formal sanctions is insig…

IS security policiesCritical security studiesStrategy and ManagementRational choice theoryIS security complianceCommitdeterrence theoryComputer Science ApplicationsTest (assessment)IS securityHuman-Computer InteractionEmpirical researchInformation security standardsrational choice theoryEconomicsIs securitySanctionsPositive economicsSocial psychologyJournal of Organizational and End User Computing
researchProduct